Terraform AWS EKS¶
Terraform module which creates Amazon EKS (Kubernetes) cluster resources on AWS with comprehensive features including managed node groups, Fargate profiles, EKS Auto Mode, add-ons, and IRSA.
Implemented Controls¶
The following compliance controls are implemented in this module.
- EKS clusters should have control plane audit logging enabled
- EKS clusters endpoint public access should be restricted
- EKS clusters endpoint should restrict public access
- EKS clusters should be configured to have kubernetes secrets encrypted using KMS
Compliance.tf registry endpoints¶
module "eks" {
source = "acscessentialeight.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "acscism2023.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "awscontroltower.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "awsgenai.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "awswellarchitected.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "cccsmedium.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "cfrpart11.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "cis.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "cisv500.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "cisv600.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "cisv80ig1.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "cisacyberessentials.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "eugmpannex11.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "fedramplow.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "fedrampmoderate.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "ffiec.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "gdpr.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "hipaa.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "iso27001.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "nist800171.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "nist80053.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "nistcsf.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "nydfs23.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "pcidss.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "rbicybersecurity.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "rbiitfnbfc.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
module "eks" {
source = "soc2.compliance.tf/terraform-aws-modules/eks/aws"
version = "<version>"
# ... your arguments here
}
See the Technical Usage Guide to get started and read the Features section for more details on how to customize the module for your requirements.
Mapped compliance frameworks¶
ISM-1402: Protecting credentials